Author of the publication

Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard.

, , , and . WCNC, page 1870-1875. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Efficient Group Signature With Forward Security., , and . Informatica (Slovenia), 28 (2): 153-157 (2004)Fair Electronic Cash Based on Double Signatur., , and . J. Comput. Sci. Technol., 17 (6): 830-835 (2002)Factors Affectting Customer's Behavior Intention., and . IPEC, page 108-112. ACM, (2021)Directed proxy signature with fast revocation proven secure in the standard model., , , , and . IET Inf. Secur., 11 (3): 168-176 (2017)Secure and efficient lightweight RFID authentication protocol based on fast tag indexing., , , , and . Int. J. Commun. Syst., 27 (11): 3244-3254 (2014)Secure Double Auction Protocols with Full Privacy Protection., , and . ICISC, volume 2971 of Lecture Notes in Computer Science, page 215-229. Springer, (2003)How to conduct a sealed bargain on the internet., , and . InfoSecu, page 130-135. ACM, (2004)Some Notes on Password Authenticated Key Exchange Based on RSA., , and . CIS (2), page 580-583. IEEE Computer Society, (2009)978-0-7695-3931-7.A Deep Copy Protection Framework for Electronic Devices within Home., , , , , and . IAS, page 23-26. IEEE Computer Society, (2009)New Key Improvements and Its Application to XTR System., , and . AINA, page 561-564. IEEE Computer Society, (2003)